Skip to main content
  • Special issue on Advances of Neural Computing phasing challenges in the era of 4th industrial revolution
  • Published:

Smart city infrastructure protection: real-time threat detection employing online reservoir computing architecture

Abstract

The most important problems that occur during the extraction of knowledge from data streams are related to the properties characterizing “BigData,” namely high speed of information flow (velocity), variety of used forms, variability of data and diversity of information accuracy diagnosis methods (veracity). The use of online or sequential learning methods offers a specialized solution for solving real-time data processing problems. Data are provided without a clear knowledge of their particular inherent characteristics. Conventional approaches focus on applying heuristic or logical analysis rules. They fail to effectively handle new patterns (produced as a function of time) and to consider the dynamic change rate of their characteristics. In most cases, these methods approximate, by creating general rather than clear imprints of knowledge, which is hidden in the flows. Moreover, their function requires significant computational resources. This paper introduces (to the best of our knowledge, for the first time in the literature) the implementation of a specialized online reservoir computing architecture for smart city infrastructure protection which has low requirements in computing resources; it is efficient and suitable for real-time data flow analysis. More specifically, it describes the development of an echo state network, comprised of analog neurons with sparse random connections at the input levels and at the dynamical reservoir. Its training at the output level is performed with the recursive least square method. A complex data set was selected for the testing of the proposed model, which fully simulates the digital attacks that can be faced by the mechatronic equipment used in smart water supply networks located in the front end of the smart cities.

This is a preview of subscription content, access via your institution.

Fig. 1

References

  1. Golab L, Tamer Ozsu M (2010) Data stream management. Morgan & Claypool, San Rafael

    MATH  Google Scholar 

  2. Kulkarni A, Pino Y, Mohsenin T (2016) Adaptive real-time Trojan detection framework through machine learning. In: 2016 IEEE international symposium on hardware oriented security and trust (HOST). McLean, VA, pp 120–123. https://doi.org/10.1109/HST.2016.7495568.

  3. Constantinides C, Shiaeles S, Ghita B, Kolokotronis N (2019) A novel online incremental learning intrusion prevention system. In: 2019 10th IFIP international conference on new technologies, mobility and security (NTMS). CANARY ISLANDS, Spain, pp 1–6. https://doi.org/10.1109/NTMS.2019.8763842.

  4. Michel AN (2003) Recurrent neural networks: overview and perspectives. In: Proceedings of the 2003 international symposium on circuits and systems, 2003. ISCAS '03. Bangkok, pp III–III. https://doi.org/10.1109/ISCAS.2003.1205059.

  5. Madankan A (2010) Recurrent neural network for solving linear matrix equation. In: 2010 International conference on electronics and information engineering. Kyoto, pp V2-70–V2-72. https://doi.org/10.1109/ICEIE.2010.5559717.

  6. Schrauwen B, Verstraeten D, Campenhout J (2007) An overview of reservoir computing: theory, applications and implementations. In: ESANN

  7. Tanaka G, Yamane T, Héroux JB, Nakane R, Kanazawa N, Takeda S, Numata H, Nakano D, Hirose A (2019) Recent advances in physical reservoir computing: a review. Neural Netw 115:100–123. https://doi.org/10.1016/j.neunet.2019.03.005

    Article  Google Scholar 

  8. Antonelo EA, Camponogara E, Foss B (2017) Echo state networks for data-driven downhole pressure estimation in gas–lift oil wells. Neural Netw 85:106–117

    Article  Google Scholar 

  9. Lukoševičius M (2012) A practical guide to applying echo state networks. In: Montavon G, Orr GB, Müller K-R (eds) Neural networks: tricks of the trade, vol 7700, 2nd edn. Springer, Berlin, pp 659–686

    Chapter  Google Scholar 

  10. Kim HG (2013) A structure for sliding window equijoins in data stream processing. In: 2013 IEEE 16th international conference on computational science and engineering. Sydney, NSW, pp 100–103. https://doi.org/10.1109/CSE.2013.25

  11. Kudithipudi D, Saleh Q, Merkel C, Thesing J, Wysocki B (2016) Design and analysis of a neuromemristive reservoir computing architecture for biosignal processing. Front Neurosci 9:1. https://doi.org/10.3389/fnins.2015.00502

    Article  Google Scholar 

  12. Chen L, Lin G (2008) Extending sliding-window semantics over data streams. In: 2008 International symposium on computer science and computational technology. Shanghai, pp 110–113. https://doi.org/10.1109/ISCSCT.2008.187

  13. Bao-Jun W, Ying Z (2011) A survey and performance evaluation on sliding window for data stream. In: 2011 IEEE 3rd International conference on communication software and networks. Xi'an, pp 654–657. https://doi.org/10.1109/ICCSN.2011.6014977

  14. Taormina R, Galelli S, Tippenhauer NO, Salomons E, Ostfeld A, Eliades DG, Aghashahi M, Sundararajan R, Pourahmadi M, Banks MK, Brentan BM, Campbell E, Lima G, Manzi D, Ayala-Cabrera D, Herrera M, Montalvo I, Izquierdo J, Luvizotto E, Chandy SE, Rasekh A, Barker ZA, Campbell B, Shafiee ME, Giacomoni M, Gatsis N, Taha A, Abokifa AA, Haddad K, Lo CS, Biswas P, Pasha MFK, Kc B, Somasundaram SL, Housh M, Ohar Z (2018) The battle of the attack detection algorithms: disclosing cyber attacks on water distribution networks. J Water Resour Plan Manag 144(8):04018048

    Article  Google Scholar 

  15. Goh J, Adepu S, Junejo KN, Mathur A (2016) A dataset to support research in the design of secure water treatment systems. In: The 11th international conference on critical information infrastructures security

  16. https://www.initialstate.com/

  17. Skopenkov A (2008) Embedding and knotting of manifolds in Euclidean spaces. In: Young N, Choi Y (eds) Surveys in contemporary mathematics. London mathematical society lecture note series, 347. Cambridge University Press, Cambridge, pp 248–342

    Google Scholar 

  18. Rhodes C, Morari M (1997) The false nearest neighbors algorithm: an overview. Comput Chem Eng 21:S1149–S1154. https://doi.org/10.1016/S0098-1354(97)87657-0

    Article  Google Scholar 

  19. Kantz H, Schreiber T (1997) Nonlinear time series analysis. Cambridge University Press, Cambridge

    MATH  Google Scholar 

  20. Hayes MH (1996) 9.4: Recursive least squares. In: Statistical digital signal processing and modeling. Wiley, p 541. ISBN 0-471-59431-8

  21. Haykin S (2002) Adaptive filter theory. Prentice Hall. ISBN 0-13-048434-2

  22. Corrêa DG, Enembreck F, Silla CN (2017) An investigation of the hoeffding adaptive tree for the problem of network intrusion detection. In: 2017 International joint conference on neural networks (IJCNN). Anchorage, AK, pp 4065–4072. https://doi.org/10.1109/IJCNN.2017.7966369

  23. Bifet A., Gavaldà R. (2009) Adaptive learning from evolving data streams. In: Adams N.M., Robardet C., Siebes A., Boulicaut JF. (eds) Advances in intelligent data analysis VIII. IDA 2009. Lecture notes in computer science, vol 5772. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03915-7_22

  24. Shalev-Shwartz S, Singer Y, Srebro N et al (2011) Pegasos: primal estimated sub-gradient solver for SVM. Math Program 127:3–30. https://doi.org/10.1007/s10107-010-0420-4

    MathSciNet  Article  MATH  Google Scholar 

Download references

Acknowledgements

The study was supported by the National Natural Science Foundation of China (No. NSFC-71771052).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaopeng Deng.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Gao, L., Deng, X. & Yang, W. Smart city infrastructure protection: real-time threat detection employing online reservoir computing architecture. Neural Comput & Applic 34, 833–842 (2022). https://doi.org/10.1007/s00521-021-05733-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-021-05733-0

Keywords

  • Online learning
  • Reservoir computing
  • Echo state network
  • Real-time threat detection
  • Stream processing
  • Critical infrastructure protection
  • Computational intelligence